Sciweavers

497 search results - page 81 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
141
Voted
DIMVA
2006
15 years 5 months ago
Network-Level Polymorphic Shellcode Detection Using Emulation
Abstract. As state-of-the-art attack detection technology becomes more prevalent, attackers are likely to evolve, employing techniques such as polymorphism and metamorphism to evad...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
BIOSIG
2003
145views Biometrics» more  BIOSIG 2003»
15 years 5 months ago
Pass Phrase Based Speaker Recognition for Authentication
: Speaker recognition in applications of our daily lives is not yet in widespread use. In order for biometric technology to make sense for real-world authentication applications an...
Heinz Hertlein, Robert Frischholz, Elmar Nöth
CHI
2005
ACM
16 years 4 months ago
Hug over a distance
People in close relationships, who are separated by distance, often have difficulty expressing intimacy adequately. Based on the results of an ethnographic study with couples, a p...
Florian Mueller, Frank Vetere, Martin R. Gibbs, Je...
ICCAD
2007
IEEE
108views Hardware» more  ICCAD 2007»
16 years 29 days ago
Novel wire density driven full-chip routing for CMP variation control
— As nanometer technology advances, the post-CMP dielectric thickness variation control becomes crucial for manufacturing closure. To improve CMP quality, dummy feature filling ...
Huang-Yu Chen, Szu-Jui Chou, Sheng-Lung Wang, Yao-...
CIKM
2009
Springer
15 years 10 months ago
User-induced links in collaborative tagging systems
Collaborative tagging systems allow users to use tags to describe their favourite online documents. Two documents that are maintained in the collection of the same user and/or ass...
Ching-man Au Yeung, Nicholas Gibbins, Nigel Shadbo...